Page 1011 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1011
B. It indicates that the sensitivity is too low.
C. It indicates the point where the false rejection rate equals the
false acceptance rate.
D. When high enough, it indicates the biometric device is highly
accurate.
14. Sally has a user account and has previously logged on using a
biometric system. Today, the biometric system didn’t recognize her
so she wasn’t able to log on. What best describes this?
A. False rejection
B. False acceptance
C. Crossover error
D. Equal error
15. What is the primary purpose of Kerberos?
A. Confidentiality
B. Integrity
C. Authentication
D. Accountability
16. Which of the following is the best choice to support a federated
identity management (FIM) system?
A. Kerberos
B. Hypertext Markup Language (HTML)
C. Extensible Markup Language (XML)
D. Security Assertion Markup Language (SAML)
17. What is the function of the network access server within a RADIUS
architecture?
A. Authentication server
B. Client
C. AAA server

